Client login method and system through regional information sharing

A technology for sharing an area and a login method, applied to a system implementing the above method, can solve the problems of complicated operation, leakage, insufficient confidentiality and security of account numbers and passwords, etc., through the client login field of shared area information, and achieve convenient operation. , to ensure the effect of safety

Active Publication Date: 2016-04-06
GUANGZHOU DUOYI NETWORK TECH
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, since the user needs to enter the account number and password on the two terminals, the operation is cumbersome
At the same time, due to the need to input the account number and password on the terminal at the same time, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client login method and system through regional information sharing
  • Client login method and system through regional information sharing
  • Client login method and system through regional information sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] See figure 1 , Which is a step flowchart of the client login method through shared area information in Embodiment 1 of the present invention.

[0038] The present invention provides a client login method through sharing area information, which specifically includes the following steps:

[0039] S11: The first client sends a login request to the client server.

[0040] S12: The client server sends the login request of the first client to the central control server.

[0041] S13: The central control server verifies the login request of the first client, and if the verification passes, sends the login credential token to the client server.

[0042] S14: The client server sends the login credential token to the first client.

[0043] S15: After obtaining the login credential token, the first client writes it into the shared area.

[0044] S16: The second client obtains the token certificate in the shared area, and logs in to the central control server through the token certificate.

[0...

Embodiment 2

[0058] The present invention provides another client login method through sharing area information, which specifically includes the following steps:

[0059] S21: The first client sends a login request to the client server.

[0060] S22: The client server sends the login request of the first client to the central control server.

[0061] S23: The central control server verifies the login request of the first client, and if the verification passes, sends the login credential token to the client server.

[0062] S24: The central control server forwards the login request to the designated business system to obtain data, and returns it to the client server. The central control server also judges the login authority of the first client, and determines whether the user can log in to the designated business system according to different authority. At the same time, the central control server also performs data storage and extraction through the database and processing through the distribute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a client login method through regional information sharing. The method comprises the following steps: a first client sending a login request to a client server; the client server sending the login request of the first client to a center control server; the center control server verifying the login request of the first client, sending a login credential token to the client server after verifying; the client server sending the login credential token to the first client; the first client writing the login credential token in a sharing region after acquiring the same; a second client acquiring the token credential in the sharing region, and logining the center control server through the token credential. Through the login mode provided by the invention, the same account can login a plurality of terminals without repeatedly inputting the account and the password; the operation of a user is more convenient, and the security of the login account is guaranteed. The invention further relates to a login system for realizing above login method.

Description

Technical field [0001] The present invention relates to a client login method, in particular to a client login method through sharing area information; the present invention also relates to a system for implementing the above method. Background technique [0002] With the development of network technology and mobile terminals, more and more client logins are no longer limited to the PC side, and more and more users migrate from the PC side to the mobile terminal to log in. For example: IM instant messaging client or other applications. These clients require the user to enter an account and password to log in when logging in. [0003] As the number of mobile terminals of users increases, it may sometimes be necessary to log in from two or more clients. For example, the user may need to log in from two mobile phones, or log in from a mobile phone and a tablet at the same time. [0004] In view of the above-mentioned problems, some existing clients can support simultaneous login on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0853
Inventor 徐波
Owner GUANGZHOU DUOYI NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products